Infosec faith healer
@infosecjohndoe.bsky.social
52 followers 200 following 76 posts
Information Security Researcher My tweets are not my own. They do not represent me or my employer. same name on twitter. Based out of Indiana
Posts Media Videos Starter Packs
infosecjohndoe.bsky.social
Thinking about this again while doing infosec stuff.

From one of the Victor books from @alexzfinley.bsky.social
infosecjohndoe.bsky.social
Louisville but I might just be nostalgic about going there for Derbycon.
infosecjohndoe.bsky.social
Lincoln’s Spies is the only one I know about. It’s on the list.
Reposted by Infosec faith healer
filippo.abyssdomain.expert
I am doing a survey of supply chain attacks, and it's annoying how 95% of the analysis is on payloads vs. compromise vectors.

Yes, you are a very smart reverser and that's a very clever payload. Yes, rolling out phishing-resistant auth is a slog. No, this is not how we make progress.

</rant>
infosecjohndoe.bsky.social
I think it’s time to rewatch The Good Lord Bird.
infosecjohndoe.bsky.social
@rejectionking.bsky.social civil war intelligence or spying book recommendations?
Book on engineering during the civil war would be cool too. I’ve always wondered about what and how shit gets built during a war.
Reposted by Infosec faith healer
rejectionking.bsky.social
reckless covert action is the cure to male loneliness (2025)
KhyberPunk 2077 The usual apts on the zoom chat The portable companion afghanistan 82 Fire the 0days!
infosecjohndoe.bsky.social
How’s the book coming along btw?
Reposted by Infosec faith healer
redteamwrangler.bsky.social
Come see me talk about Reverse Engineering Surveillance Infrastructure and Feeding Your Neighbors TORMORROW at 12:20pm CT for Pancakescon 2025!

Check out the other speakers in the lineup!

pancakescon.com/2025-confere...
Reposted by Infosec faith healer
weld.bsky.social
Teen hackers aren’t villains-in-waiting, they’re untapped defenders. We can intercept talent early, show real career paths, and turn curiosity into cyber defense. My take on building ethical on-ramps for #cybersecurity www.forbes.com/councils/for...
Intercepting Talent: Turning Hackers Into Cyber Defenders
Teen hackers are reshaping cybersecurity. Channeling their curiosity into ethical hacking could transform risks into the next wave of defenders.
www.forbes.com
Reposted by Infosec faith healer
redteamwrangler.bsky.social
Back in the good old days when a company would pay for four senior consultants and one junior consultant to work a single gig.
Outtake from Sneakers (1992), the five main protagonists standing around in front of a van.
infosecjohndoe.bsky.social
My ability to recognize and avoid weird internet subcultures is great!
Reposted by Infosec faith healer
machete.gay
If I have any advice to parents as someone who isn't a parent but is a professional expert in online-poisoned idiots, it's if your dumbass son wants to dress as a meme, you need to respond with, "Boy, you are not going to get any pussy if you keep this shit up."
infosecjohndoe.bsky.social
Dept of energy now posts some dumb shit as well.
idk who you could invite on the podcast but like what’s next? How do you even fix or recover from this?
Reposted by Infosec faith healer
acekatana.bsky.social
[Pusha T] hit the holy see in the two seater / what's sweeter? the jesus piece or the keys of peter / from the street to the mitre, all prada / she heard my bro a Leo, she call he papa

[Malice] young and reckless / coke whiter than the papal vestments
infosecjohndoe.bsky.social
Me during incident response.
unraveledpress.com
"Everyone wants to be involved, but not everyone wants to help."
infosecjohndoe.bsky.social
Haven’t read the paper but I thought it was interesting.
bsky.app/profile/alex...
alexbnewhouse.bsky.social
New peer-reviewed research from me and @drkowert.bsky.social!

We introduce the concept of "performative infighting" to describe the ways that extremists fabricate fragmentation and internal conflict to build collective identity. Here we focus on Steam. 1/

www.frontiersin.org/journals/psy...
Frontiers | Extremist identity creation through performative infighting on Steam
The video game marketplace Steam has long hosted a lively social network for the purpose of connecting game players and game developers. Over the past 5 year...
www.frontiersin.org
Reposted by Infosec faith healer
jarjarfan69.bsky.social
We need you to infiltrate a notorious pedophile hangout. To make sure they don't suspect you, you will be a real-life pedophile. To do this, we are going to have you become best friends with the main pedophile for years, and then to ensure you don't get in trouble, you need to get elected president.
Nathan Fielder.
Reposted by Infosec faith healer
cyberwarcon.bsky.social
Did you know that we have 50+ talks available on our YouTube?
Catch them here > youtube.com/@CYBERWARCON

Keep in mind, we don't post all past talks. The only way to make sure you don't miss any this year is by joining in person or virtually!

Grab your tix >> www.cyberwarcon.com
CYBERWARCON
CYBERWARCON is a one-day, in-person and virtual conference held in Arlington, VA, dedicated to examining how cyber capabilities are used to cause destruction, disruption, and malicious influence on so...
youtube.com
infosecjohndoe.bsky.social
This guy is everywhere! Literally on most of my fav shows.
Pic of Richard kind from only murders show
Reposted by Infosec faith healer
noahs.bsky.social
found this lying outside my home. someone must have been shooting up with it. disgusting. Los Angeles is becoming a failed state like vuvuzela
infosecjohndoe.bsky.social
Just signed up to attend virtually!! This will be my second time.
cyberwarcon.bsky.social
CYBERWARCON is coming!!! Registration and CFP are now open for this year's #CYBERWARCON! This year's keynote speaker will be @dmitri.silverado.org!!
We are back in Arlington, VA this year on November 19th.

www.cyberwarcon.com
CYBERWARCON
www.cyberwarcon.com
Reposted by Infosec faith healer
koltai.bsky.social
Are you a student (or staff/faculty) at a US academic institution?

We are offering a couple of free webinars for students to strengthen their digital investigation skills! Our normal workshops are often cost-prohibitive to students, so these are a limited offering!

Limited spots available!